Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe
-
Size
310KB
-
MD5
173d0e92303587e1f3564b59eb463c25
-
SHA1
e0816bebae695d3f988a4969c34fd6e06b3e9191
-
SHA256
e1e6006649d476a243c058b0df39c29c2e464ee97fbedbdf531075cc6204b37d
-
SHA512
023d95dc6ac09c7a1388f73499ae671f54566938c01a594b6a501dceec3395d925d8bc0761f3d280fb29cb1110214673fee7ccf98388a3d31a6e562a58a74c1c
-
SSDEEP
6144:pmQXVDBkM4le0xNQD8ntXHilVuW+gA9x4O+BUjwgN6cexETrRd:0QFhYnN1nNH21+g+x4O+Bj065ErD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3964 WINS.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\WINS.exe 173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe File opened for modification C:\Windows\WINS.exe 173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe File created C:\Windows\uninstal.bat 173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" WINS.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" WINS.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" WINS.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WINS.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" WINS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3336 173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe Token: SeDebugPrivilege 3964 WINS.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3964 WINS.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3964 wrote to memory of 4856 3964 WINS.exe 83 PID 3964 wrote to memory of 4856 3964 WINS.exe 83 PID 3336 wrote to memory of 3956 3336 173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe 84 PID 3336 wrote to memory of 3956 3336 173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe 84 PID 3336 wrote to memory of 3956 3336 173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
C:\Windows\WINS.exeC:\Windows\WINS.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310KB
MD5173d0e92303587e1f3564b59eb463c25
SHA1e0816bebae695d3f988a4969c34fd6e06b3e9191
SHA256e1e6006649d476a243c058b0df39c29c2e464ee97fbedbdf531075cc6204b37d
SHA512023d95dc6ac09c7a1388f73499ae671f54566938c01a594b6a501dceec3395d925d8bc0761f3d280fb29cb1110214673fee7ccf98388a3d31a6e562a58a74c1c
-
Filesize
218B
MD5082b364047dc8330a917799cd44b477e
SHA1e0ef662f46391a05fe72c2be9ccfe99fd4801292
SHA25626da2261e08d938df2488d37df5dc831c9ee1a2a31e68524e78ac15b9a229c68
SHA512a2f3f5c4c3745deaa9e61c0059015cfdead062d1faa357eeafff3b1c492b2383a3d63ce8478e13b0e99cc10fa68c5b219d5066e5b4b19f6d1a31dc5610ed1f85